Monday, October 22, 2007

Global Citizenship


Are MMO (Massive Multiplayer Online) worlds ideal late capitalist machine based on the social interaction, play and cultural simulation, or they can be seen as ideal social laboratories based on social interaction, play and cultural simulation?'


Networked innovation and collaboration means quantity may have a quality all its own.
As education systems around the world approach parity, nations will finally be able to maximize the skills and potential of their populations... No nation-state will be able to compete counting only on the people within her borders. The most successful 21st century nations will be those that redefine what it means to be a citizen and build the largest networks of innovators.

Consider a second type of citizenship, dubbed “virtual citizenship” or “v-citizenship.”
Rather than building around a specific geography or event, v-citizens are tied to a nation-state by mind share and time. They meet and collaborate within virtual worlds, enabling them to ignore geographic limitations and focus instead on challenges and connections with other v-citizens. Rather than spending four days per year thinking about a particular nation, a v-citizen could spend one hour per week or five hours per month. More importantly, that time could be spent in virtual locations populated by other v- and g-citizens (Geography citizens) of the nation.


V-citizenship (Virtual citizenship) is a natural extension of the global information connections being built around the world. In a time of increasingly nationalistic and geographic biases, a nation-state embracing v-citizenship, making it easy for innovators and entrepreneurs around the world to collaborate with its g-citizens would change innovation for all of its citizens and set a new bar for economic growth.

References: Cory Ondrejka , Kristian Lukic

Saturday, October 20, 2007

Faceless
























In a current alcohol advertisement a'' melancholic '' android faces the public and volunteering grant certain privileges of ''major importance'' to humans. It grants almost everything but at the same time it steals, hides and keeps for itself the most considerable one. The privilege of self-knowledge reserved so far to the man of discrimination. The wisdom to know by yourself who you are. In brief: the machine knows better than humans, for humans who they ''really'' are.
There are people that destroy and burn surveillance cameras and by that act, confirm the android's stance and its message. By destroying a street camera, one not only accepts that he/she ignores who he/she is, but also that he/she is incapable to understand the system that ''attacks''. Fortunately, there are exceptions.
The following case is one of them:

The FACELESS Project (2002–2007) deals with legal issues around surveillance (CCTV) images. Besides the 50 minute sci-fi film, the project has resulted in works including The Manifesto for CCTV Filmmakers; The Eye: Choreography for surveilled space; The Making-of Lounge: Research and behind-the scenes materials; and The Spectral Children: a multiple screen video installation.

pattern recognition


18 May 2007, Somers Point, New Jersey:

"Graphic Fatal Crash Video Leaked to the Internet," Associated Press.

Graphic video of a fatal car crash has been circulating on the Internet, and the agency that operates the toll road where the crash occurred has launched an investigation to determine how the surveillance footage was leaked.

"We're not happy about it, that goes without saying," Joseph Orlando, spokesman for the New Jersey Turnpike Authority, said Friday. The crash occurred May 10 at a toll plaza on the Garden State Parkway, which is operated by the Turnpike Authority.

Orlando said the agency has contacted Web sites including Youtube.com and LiveLeak.com to request that the video be removed. The Press of Atlantic City, which had posted a copy downloaded from the Internet on its Web site, said it removed the video voluntarily on Friday after learning of the Turnpike Authority's objections.

The crash video was still posted at the YouTube and LiveLeak Web sites as of late Friday night. Messages left Friday night by The Associated Press for Jaime Schopflin, a spokeswoman for San Bruno, Calif.-based YouTube, and at a media contact number in England for LiveLeak were not immediately returned.

The video depicts a car slamming into the Garden State Parkway's Great Egg Harbor toll plaza, about 10 miles south of Atlantic City, at high speed and bursting into flames. Killed in the crash was Bernard King, 52, a casino dealer from Lower Township. State police said Friday that they are still investigating the cause and are trying to determine if King's history of seizures was a factor.

An Atlantic City television station, WMGM-TV 40, also aired the video on a Thursday night newscast, with a warning that it could upset some viewers. The station's news director, Harvey Cox, said the station did not receive any complaints about the video.

Orlando said the toll plaza surveillance cameras are controlled by the parkway's operations and toll personnel but that officials have "no inkling" at this time who leaked the video.


Surveillance Camera Players

Friday, October 19, 2007

levelHead, a Spatial Memory Game

Julian Oliver just released a short video of his latest project, levelHead. This is how it works. You plug a webcam on your computer and you physically move around a little cube. The cube is shown on your computer but, magically, you get to see different rooms inside it and a little character that you control by tilting the cube. The game´s goal is to get the character out of the house. As he said he will soon release the code that is of course open source.
Excellent.
http://www.youtube.com/watch?v=5ks1u0A8xdU

Monday, October 15, 2007

Destratify Athens




...in terms of the stratified and the destratified, human history is not marked by stages of progress but by coexistence of accumulated material of diverse kinds, as well as by the processes of stratification and destratification that these interacting accumulations undergo. In this sense, we could characterize our era as the ''age of information'' or, equally validly, as the ''second age of insects and germs''.
Manuel De Landa, A thousand years of nonlinear history.

‘I Can’t Go On, I’ll Go On’

‘I Can’t Go On, I’ll Go On’

Sunday, October 14, 2007

A metaphor


Reforming Athens.
The ''metaphor'' of the marbles carries the whole of the city ''from a time of Time to a time of Space, from a time of succession to a time of co-existence''.
Acropolis is no longer a classical modernistic hierarchical symbol but a post modern heteriarchical one. What will be our new “matters of concern”?




What exactly can someone tell from your IP address and what can they do with it? Can they find personal details or my precise geographical location?
In most cases your IP address is very easy to determine. But how much it says about you, specifically, depends on your ISP and what kind of IP address you have.


Finding someone else's IP can be as easy as looking at the full headers of email that they've sent you, or monitoring network connections for certain types of instant messaging and chat applications. Web sites routinely get IP address information for all visitors. They very nature of how the internet works dictates that when two computers talk to each other, they know each other's IP addresses.

But once you've received an IP address, what can you tell about it?

Some IP's are easy - they're static, and have a DNS name associated with them. For example, in a Windows XP Command Shell, enter the following command:

ping -a 17.254.3.183
The "-a" switch tells ping to do a "reverse DNS lookup", and print the first domain name it finds associated with the IP address you've specified. In this case, ping should include "apple.com" in its output, which is a domain name assigned to that IP.

With that domain name you can then do a "whois" lookup through using whois tools. That information will often include the information about the individual or organization that owns the domain. In this example, it does not, but includes the name of the registrar, markmonitor.com. Visiting that site there is a small "whois" link which, when run against "apple.com" returns all the information that you might want. Apple.com is owned, not surprisingly, by Apple Computer, Inc., and full address and contact information is available.

What if the ping doesn't work, or doesn't return a domain name? Then things get less precise.

In this case, we go to ARIN and use their IP "whois" tool. If we enter an IP address such as 206.124.145.17, we'll find that it's part of a block of addresses assigned to an ISP. In order to determine who actually is using that IP address, if anyone, the ISP would have to get involved. Note that without their involvement, the physical location of a machine at a specific IP address can not be determined.

Now, it's important to note that an IP address may, or may not, identify a specific computer. In many cases, such as large corporations, it identifies a gateway of some sort that acts as a router or proxy for any number of computers. Behind the gateway, the computers can all see each other, but from the internet the individual machines are indistinguishable from each other ... they all look like they come from the same IP address.

The same is true when you use a router at home. You might have any number of computers behind it, but from the internet, it appears as if you have only one IP address. Your individual computers are not directly accessible by default.

And that leads to my final point: use a router or a firewall. If you connect directly to the internet, then your IP address can be used by others on the network to attempt to connect directly to your PC and exploit any vulnerabilities. By using a router your computer cannot be contacted directly. Alternately, a firewall blocks the intruders from gaining access to your machine even if they do reach it.

Saturday, October 13, 2007

Thursday, October 11, 2007

for God's shake why technology is not neutral?

V/L

Technology is not neutral. It is not neutral ; it's a black continent

Tuesday, October 9, 2007

Fifteen Theses on Contemporary Art

Fifteen Theses on Contemporary Art

In Contemporary Cultural Wars, it is quite appropriate to know the pieces that form the consistency of the play ground that one is striving.

1. Art is not the sublime descent of the infinite into the finite abjection of the body and sexuality. It is the production of an infinite subjective series through the finite means of a material subtraction.

2. Art cannot merely be the expression of a particularity (be it ethnic or personal). Art is the impersonal production of a truth that is addressed to everyone.

3. Art is the process of a truth, and this truth is always the truth of the sensible or sensual, the sensible as sensible. This means: the transformation of the sensible into a happening of the Idea.

4. There is necessarily a plurality of arts, and however we may imagine the ways in which the arts might intersect there is no imaginable way of totalizing this plurality.

5. Every art develops from an impure form, and the progressive purification of this impurity shapes the history both of a particular artistic truth and of its exhaustion.

6. The subject of an artistic truth is the set of the works which compose it.

7. This composition is an infinite configuration, which, in our own contemporary artistic context, is a generic totality.

8. The real of art is ideal impurity conceived through the immanent process of its purification. In other words, the raw material of art is determined by the contingent inception of a form. Art is the secondary formalization of the advent of a hitherto formless form.

9. The only maxim of contemporary art is not to be imperial. This also means: it does not have to be democratic, if democracy implies conformity with the imperial idea of political liberty.

10. Non-imperial art is necessarily abstract art, in this sense: it abstracts itself from all particularity, and formalizes this gesture of abstraction.

11. The abstraction of non-imperial art is not concerned with any particular public or audience. Non-imperial art is related to a kind of aristocratic-proletarian ethic: Alone, it does what it says, without distinguishing between kinds of people.

12. Non-imperial art must be as rigorous as a mathematical demonstration, as surprising as an ambush in the night, and as elevated as a star.

13. Today art can only be made from the starting point of that which, as far as Empire is concerned, doesn't exist. Through its abstraction, art renders this inexistence visible. This is what governs the formal principle of every art : the effort to render visible to everyone that which for Empire (and so by extension for everyone, though from a different point of view), doesn't exist.

14. Since it is sure of its ability to control the entire domain of the visible and the audible via the laws governing commercial circulation and democratic communication, Empire no longer censures anything. All art, and all thought, is ruined when we accept this permission to consume, to communicate and to enjoy. We should become the pitiless censors of ourselves.

15. It is better to do nothing than to contribute to the invention of formal ways of rendering visible that which Empire already recognizes as existent.



Art: Mark Lombardi, George W. Bush, Harken Energy and Jackson Stephens c. 1979-90, fifth version, 1999
courtesy of Independent Curators international, NYC
.

Sunday, October 7, 2007

tor

a distributed, anonymous network?

Export of cryptography

The export of cryptography refers to the transfer from one country to another of devices and technology related to cryptography. Since World War II, Western governments, including the U.S.NATO allies, have regulated the export of cryptography for national security considerations, and, for a time, defined cryptography to be a munition.

In light of the enormous impact of cryptanalysis in WWII, it was abundantly clear to these governments that denying current and potential enemies access to cryptographic systems looked to be militarily valuable. They also wished to monitor the diplomatic communications of other nations, including the many new nations that were emerging in the post-colonial period and whose position on Cold War issues was regarded as vital. (Kahn, The Codebreakers, Ch. 19) Since the U.S. and U.K. had, they believed, developed more advanced cryptographic capabilities than others, there arose a notion that controlling all dissemination of the more effective crypto techniques might be beneficial. The First Amendment made controlling all use of cryptography inside the U.S. difficult, but controlling access to U.S. developments by others was thought to be more practical — there were at least no constitutional impediments. Accordingly, regulations were introduced as part of munitions controls which required licenses to export cryptographic methods (and even their description); the regulations established that cryptography beyond a certain strength (defined by algorithm and length of key) would not be licensed for export except on a case-by-case basis. The expectation seems to have been that this would further national interests in reading 'their' communications and prevent others from reading 'ours'. This policy was also adopted elsewhere for various reasons.

The development, and public release, of DES and asymmetric key techniques in the 1970s, the rise of the Internet, and the willingness of some to risk and resist prosecution, eventually made this policy impossible to enforce, and by the late 1990s it was being relaxed in the US, and to some extent (e.g. France) elsewhere. Nevertheless, some officials in the U.S. believe that widespread availability of strong cryptography world-wide has hampered the ability of the NSA to read intercepted communications that might reveal important information about intentions hostile to the United States.[1] Others feel that the export controls in place in the last half of the 20th century discouraged incorporation of widely known cryptographic tools into commercial products, particularly personal computer operating systems, and are a root cause of the present crisis in information security, aside from interfering with U.S. trade in such products. They observe that many of the advances, including asymmetric key cryptography and many of its algorithms, were already public in any case.

again from wikipedia

cookies & thieves

During normal operation, cookies are sent back and forth between a server (or a group of servers in the same domain) and the computer of the browsing user. Since cookies may contain sensitive information (user name, a token used for authentication, etc.), their values should not be accessible to other computers. Cookies theft is any process allowing an unauthorised party to receive a cookie.

A first way cookies can be stolen is via packet sniffing. Traffic on a network can be read by computers on the network other than its sender and its receiver. This traffic includes cookies sent on ordinary HTTP sessions. Users on these computers can read the traffic on the network, including the cookies, using programs called packet sniffers. This problem can be overcome by using the https URI scheme, which invokes Transport Layer Security to encrypt the connection. A server can specify the secure flag while setting a cookie; the browser will then send it only over a secure channel, such as an SSL connection.

A different way to steal cookies is cross-site scripting, which makes the browser itself send cookies to servers that should not receive them. Modern browsers allow execution of pieces of code retrieved from the server. If cookies are accessible during execution, their value may be communicated in some form to servers that should not access them. Encrypting cookies before sending them on the network does not help against this attack.[12]

This possibility is typically exploited by attackers on sites that allow users to post HTMLHttpOnly flag;[13] this is a Microsoft option that makes a cookie inaccessible to client side script. content. By embedding a suitable piece of code in an HTML post, an attacker may receive cookies of other users. Knowledge of these cookies can then be exploited by connecting to the same site using the stolen cookies, thus being recognised as the user whose cookies have been stolen. A way for preventing such attacks is by the



from wikipedia

Allegorythms



more echelon keywords




It's always good to know what the government is interested in...

Explosives, guns, assassination, conspiracy, primers, detonators, initiators, main charge, nuclear charges, ambush, sniping, motorcade, IRS, BATF, jtf-6, mjtf, hrt, srt, hostages, munitions, weapons, TNT, rdx, amfo, hmtd, picric acid, silver nitrite, mercury fulminate, presidential motorcade, salt peter, charcoal, sulfur, c4, composition b, amatol, petn, lead azide, lead styphante, ddnp, tetryl, nitrocellulose, nitrostarch, mines, grenades, rockets, fuses, delay mechanism, mortars, rpg7, propellants, incendiaries, incendiary device, thermite, security forces, intelligence, agencies, hrt, resistance, psyops, infiltration, assault team, defensive elements, evasion, detection, mission, communications, the football, platter charge, shaped charges, m118, claymore, body armor, charges, shrapnel, timers, timing devices, boobytraps, detcord, pmk 40, silencers, Uzi, HK-MP5, AK-47, FAL, Jatti, Skorpion MP, teflon bullets, cordite, napalm, law, Stingers, RPK, SOCIMI 821 SMG, STEN, BAR, MP40, HK-G3,FN-MAG, RPD,PzB39, Air Force One, M60, RPK74, SG530, SG540, Galil arm, Walther WA2000, HK33KE, Parker-Hale MOD. 82, AKR, Ingram MAC10, M3, L34A1, Walther MPL, AKS-74, HK-GR6, subsonic rounds, ballistic media, special forces, JFKSWC, SFOD-D! , SRT, Rewson, SAFE, Waihopai, INFOSEC, ASPIC, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Kenya, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, NAIA, SAPM, ASU, ECHELON ASTS, National Information Infrastructure, InfoSec, SAO, Reno, Compsec, JICS, Computer Terrorism, Firewalls, Secure Internet Connections, RSP, ISS, JDF, Passwords, NAAP, DefCon V, RSO, Hackers, Encryption, ASWS, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secret Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, SALDV, PEM, resta, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, Tanzania, SAMU, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, ram, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, SADCC, NSLEP, SACLANTCEN, FALN, 877, NAVELEXSYSSECENGCEN, BZ, CANSLO, CBNRC, CIDA, JAVA, rsta, Awarehouse, Active X, Compsec 97, RENS, LLC, DERA, JIC, ri! p, rb, Wu, RDI, Mavricks, BIOL, Meta-hackers, ^?, SADT, Steve Case, Tools, RECCEX, Telex, OTAN, monarchist, NMIC, NIOG, IDB, MID/KL, NADIS, NMI, SEIDM, BNC, CNCIS, STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI, BRGE, SARL, Military Intelligence, JICA, Scully, recondo, Flame, Infowar, Bubba, Freeh, Donaldson, Archives, ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA, NCSA, ASVC, spook words, RRF, 1071, Bugs Bunny, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce, Lacrosse, Bunker, Flashbangs, HRT, IRA, EODG, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, site, SASSTIXS, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, SARD, LABLINK, USACIL, SAPT, USCG, NRC, ~, O, NSA/CSS, CDC, DOE, SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, bemd, SGC, UNCPCJ, CFC, SABENA, DREO, CDA, SADRS, DRA, SHAPE, bird dog, SACLANT, BECCA, DCJFTF, HALO, SC, TA SAS, Lander, GSM, T Branch, AST, SAMCOMM, HAHO, FKS, 868, GCHQ, DITSA, S! ORT, AMEMB, NSG, HIC, EDI, benelux, SAS, SBS, SAW, UDT, EODC, GOE, DOE, SAMF, GEO, JRB, 3P-HV, Masuda, Forte, AT, GIGN, Exon Shell, radint, MB, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, SART, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6, 757, Kh-11, EODN, SHS, ^X, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, NSS, Duress, RAID, Uziel, wojo, Psyops, SASCOM, grom, NSIRL, D-11, SERT, VIP, ARC, S.E.T. Team, NSWG, MP5k, SATKA, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, MEU/SOC,PSAC, PTT, RFI, ZL31, SIGDASYS, TDM, SUKLO, SUSLO, TELINT, fake, TEXTA, ELF, LF, MF, SIGS, VHF, Recon, peapod, PA598D28, Spall, dort, 50MZ, 11Emc Choe, SATCOMA, UHF, SHF, ASIO, SASP, WANK, Colonel, domestic disruption, 5ESS, smuggle, Z- 200, 15kg, UVDEVAN, RFX, nitrate, OIR, Pretoria, M-14, enigma, Bletchley Park, Clandestine, NSO, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, SARA, Rapid Reaction, JSOF! C3IP, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, M-x spook, Z-150T, High Security, Security Evaluation, Electronic Surveillance, MI-17, ISR, NSAS, Counterterrorism, real, spies, IWO, eavesdropping, debugging, CCSS, interception, COCOT, NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside, Capricorn, NAVCM, Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC, .tc, 2EME REP, FID, 7NL SBS, tekka, captain, 226, .45, nonac, .li, Ionosphere, Mole, Keyhole, NABS, Kilderkin, Artichoke, Badger, Emerson, Tzvrif, SDIS, T2S2, STTC, DNR, NADDIS, NFLIS, CFD, quarter, Cornflower, Daisy, Egret, Iris, JSOTF, Hollyhock, Jasmine, Juile, Vinnell, B.D.M., Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, rusers, Covert Video, Intiso, r00t, lock picking, Beyond Hope, LASINT, csystems, .tm, passwd, 2600 Magazine, JUWTF, Competitor, EO, Chan, Pathfinders, SEAL Team 3, JTF, Nash, ISSAA, B61-11, Alouette, executive, Event Security,! Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, SUW, J2, Embassy, ETA, Fax, finks, Fax encryption, white noise, Fernspah, MYK, GAFE, forcast, import, rain, tiger, buzzer, N9, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, OC3, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, Z, sweeping, SURSAT, 5926, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, NAIAG, Cypherpunks, NARF, 127, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, JTF-6, AVN, ISSSP, Anonymous, W, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, SUBACS, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, UXO, (), OC-12, counterintelligence, Shaldag, sport, NASA, TWA, DT, gtegsc, owhere, .ch, hope, emc, industr! ial espionage, SUPIR, PI, TSCI, spookwords, industrial intelligence, H.N.P., SUAEWICS, Juiliett Class Submarine, Locks, qrss, loch, 64 Vauxhall Cross, Ingram Mac-10, wwics, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Siemens, RPC, Met, CIA-DST, INI, watchers, keebler, contacts, Blowpipe, BTM, CCS, GSA, Kilo Class, squib, primacord, RSP, Z7, Becker, Nerd, fangs, Austin, no|d, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, BROMURE, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Starr, Wackenhutt, EO, burhop, Wackendude, mol, Shelton, 2E781, F-22, 2010, JCET, cocaine, Vale, IG, Kosovo, Dake, 36,800, Hillal, Pesec, Hindawi, GGL, NAICC, CTU, botux, Virii, CCC, ISPE, CCSC, Scud, SecDef, Magdeyev, VOA, Kosiura, Small Pox, Tajik, +=, Blacklisted 411, TRDL, Internet Underground, BX, XS4ALL, wetsu, muezzin, Retinal Fetish, WIR, Fetish, FCA, Yobie, forschung, emm, ANZUS, Reprieve, NZC-332, edition, cards, mania, 701, CTP, CATO, Phon- e, Chicago! Posse, NSDM, l0ck, spook, keywords, QRR, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, NSWT, press- release, WISDIM, burned, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Enforcers, Digicash, zip, SWAT, Ortega, PPP, NACSE, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, SM, JCE, Middleman, KLM, Blackbird, NSV, GQ360, X400, Texas, jihad, SDI, BRIGAND, Uzi, Fort Meade, *&, gchq.gov.uk, supercomputer, bullion, 3, NTTC, Blackmednet, :, Propaganda, ABC, Satellite phones, IWIS, Planet-1, ISTA, rs9512c, South Africa, Sergeyev, Montenegro, Toeffler, Rebollo, sorot, cryptanalysis, nuclear, 52 52 N - 03 03 W, Morgan, Canine, GEBA, INSCOM, MEMEX, Stanley, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, WASS, WID, Dolch, secure shell, screws, Black-Ops, O/S, Area51, SABC, basement, ISWG, $ @, data-haven, NSDD, black-bag, rack, TEMPEST, Goodwin, rebels, ID, MD5, ID! EA, garbage, market, beef, Stego, ISAF, unclassified, Sayeret Tzanhanim, PARASAR, Gripan, pirg, curly, Taiwan, guest, utopia, NSG, orthodox, CCSQ, Alica, SHA, Global, gorilla, Bob, UNSCOM, Fukuyama, Manfurov, Kvashnin, Marx, Abdurahmon, snullen, Pseudonyms, MITM, NARF, Gray Data, VLSI, mega, Leitrim, Yakima, NSES, Sugar Grove, WAS, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, XM, Parvus, NAVSVS, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, blow out, BUDS, WQC, Flintlock, PABX, Electron, Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1, erco, Toffler, FAS, RHL, K3, Visa/BCC, SNT, Ceridian, STE, condor, CipherTAC-2000, Etacs, Shipiro, ssor, piz, fritz, KY, 32, Edens, Kiwis, Kamumaruha, DODIG, Firefly, HRM, Albright, Bellcore, rail, csim, NMS, 2c, FIPS140-1, CAVE, E-Bomb, CDMA, Fortezza, 355ml, ISSC, cybercash, NAWAS, government, NSY, hate, speedbump, joe, illuminati, BOSS, Kourou, Misawa, Morse, HF, P415, ladylove, fi! lofax, Gulf, lamma, Unit 5707, Sayeret Mat'Kal, Unit 669, Sayeret Golani, Lanceros, Summercon, NSADS, president, ISFR, freedom, ISSO, walburn, Defcon VI, DC6, Larson, P99, HERF pipe-bomb, 2.3 Oz., cocaine, $, impact, Roswell, ESN, COS, E.T., credit card, b9, fraud, ST1, assassinate, virus, ISCS, ISPR, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, WWSV, Atlas, IWWSVCS, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, SASSTIXS, IWG, Lynch, 414, Face, Pixar, IRIDF, NSRB, eternity server, Skytel, Yukon, Templeton, Johohonbu, LUK, Cohiba, Soros, Standford, niche, ISEP, ISEC, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, NSOF, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, LITE, PKK, HoHoCon, SISMI, ISG, FIS, MSW, Spyderco, UOP, SSCI, NIMA, HAMASMOIS, SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin, AG, chameleon man, Hutsul, CESID, Bess, rail gun, .375, Peering, CSC, Tangimoana Beach, Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST, MITI, JERTO, SDF, Koancho, Blenheim, Rivera, Kyudanki, varon, 310, 17, 312, NB, CBM, CTP, Sardine, SBIRS, jaws, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, meta, Faber, SFPD, EG&G, ISEP, blackjack, Fox, Aum, AIEWS, AMW, RHL, Baranyi, WORM, MP5K-SD, 1071, WINGS, cdi, VIA, DynCorp, UXO, Ti, WWSP, WID, osco, Mary, honor, Templar, THAAD, package, CISD, ISG, BIOLWPN, JRA, ISB, ISDS, chosen, LBSD, van, schloss, secops, DCSS, DPSD, LIF, PRIME, SURVIAC, telex, SP4, Analyzer, embassy, Golf, B61-7, Maple, Tokyo, ERR, SBU, Threat, JPL, Tess, SE, EPL, SPINTCOM, ISS-ADP, Merv, Mexico, SUR, SO13, Rojdykarna, airframe, 510, EuroFed, Avi, shelter, Crypto AG.

There are some interesting things up there. I was fascinated to notice that obscure topics that the government claims not to be interested in or is keeping secret are there, as well as our old friends the 'illuminati'. There are loads of what I presume are code names and alphabet agencies, so if anyone knows what they are, I would be intruiged to know...
hack to learn
and not
learn to hack.

Real time manifesto (after the Tales of Tales)_part4

Reject dehumanisation: tell stories.
Stories ground people in culture,
(and remove the alienation that causes aggression)
stimulate their imagination,
(and therefore improve the capability to change)
teach them about themselves
and connect them with each other.
Stories are a vital element of society.
Embrace non-linearity.
Let go of the idea of plot.
Realtime is non-linear.
Tell the story through interaction.
Do not use in-game movies or other non-realtime devices to tell the story.
Do not create a “drama manager”: let go of plot!
Plot is not compatible with realtime.
Think “poetry”, not “prose”.
The ancient Greek philosopher Aristotle recognized six elements in Drama.
PLOT
what happens in a play, the order of events,is only one of them.
Next to plot we have
THEME
or the main idea in the work
CHARACTER
or the personality or role played by an actor
DICTION
the choice and delivery of words
MUSIC/RHYTHM
the sound, rhythm and melody of what is being said
SPECTACLE
the visual elements of the work.
All of these can be useful in non-linear realtime experiences. Except plot.
But the realtime medium offers additional elements that easily augment or replace plot.
INTERACTIVITY
the direct influence of the viewer on the work
IMMERSION
the presence of the viewer in the work
AN AUDIENCE OF ONE
every staging of the work is done for an audience of a single person in the privacy of his
or her
home.
These new elements add the viewer as an active participant to the experience.
This is not a reduction of the idea of story but an enrichment.
Realtime media allow us to tell stories that could not be told before.
Many of the mythical fantasies about art can now be made real.
Now we can step into paintings and become part of them.
Now sculptures can come alive and talk to us.
Now we walk onto the stage and take part in the action.
We can live the lives of romance characters.
Be the poet or the muse.
Do not reject stortelling in realtime because it is not straightforward.
Realtime media allow us to make ambiguity and imagination active parts of the experience.
Embrace the ambiguity:
it is enriching.
The realtime medium allows for telling stories that canot be told in any other language.
But realtime is not suitable for linear stories:
Embrace non-linearity!
Reject plot!
Realtime is a poetic technology.
Populate the virtual world with narrative elements that allow the player to make up his or her
own story.
Imagination moves the story into the user’s mind.
It allows the story to penetrate the surface and take its place amongst the user’s thoughts &
memories.
The bulk of your story should be told in realtime, through interaction.
Do not use in-game movies or other devices.
Do not fall back on a machine to create plot on the fly:
let go of plot,plot is not compatible with realtime.
Do not squeeze the realtime medium into a linear frame.
Stories in games are not impossible or irrelevant, even if “all that matters is gameplay”
Humans need stories and will find stories in everything.
Use this to your advantage.
Yes, “all that matters is gameplay”,
if you extend gameplay to mean all interaction in the game.
Because it is through this interaction that the realtime medium will tell its stories.
The situation is the story.
Choose your characters and environment carefully
so that the situation immediately triggers narrative associations in the mind of the user.

Thursday, October 4, 2007

Wednesday, October 3, 2007

magnetron

video games are the first step in a plan for machines to help the human race, the only plan that offers a future for intelligence

Tuesday, October 2, 2007

Monday, October 1, 2007

cockpit

Real time manifesto (after the Tales of Tales)_part3

Embed the user in the environment.
The user is not disembodied in virtual space but takes the body into the experience.
The avatar is not a neutral vessel but allows the user to navigate not only through the virtual
space but also through the narrative content.
Interaction is the link between the user and the piece.
Provide for references
(both conceptual and sensorial)
to connect the user to the environment.
Reject abstraction.
Make the user feel at home.
(and then play with his
or her
expectations-just don’t start with alienation,
the real world is alienation enough as it is)
Reject the body-mind duality.
The user is the center of the experience.
Think “architecture”, not “film”.
Interaction is pivot alto “put the user in the environment”.
The user is not disembodied but is provided with a device
(similar to a diving suit or astronaut’s outfit)
which allows him
or her
to visit a place that would otherwise not be accessible.
You bring your body with you to this place,
or at least your memories of it.
Strictly speaking, our output media only allow for the reproduction of visuals and sound.
But real-time interaction and processing can help us to achieve simulation of touch, smell and
taste as well, through visuals and sound.
In fact, force feedback already provides for a way to communicate with touch.
And the activity of fingers on the mouse or hands holding a joystick allows for physical communication.
Don’t underestimate this connection.
From the USB port to the joystick. Through the hand to the nervous system.
One network.
Soon as smell and taste can be reproduced, those media can quickly be incorporated into our
technology.
The virtual place is not necessarily alien.On the contrary:It can deal with any subject.
References to the real world
(of nature as well as culture)
(both conceptual and sensorial)
create links between the environment and the user.
Since interaction is pivotal, these links are crucial.
Make it feel real, not necessarily look real.
Develop a unique language for the realtime 3D medium and do not fall in McLuhan's trap
(don’t allow any old medium to become the content of the new)
Imitate life and not photography, or drawings, or comic strips or even old-school games.
Realism does not equal photo -realism!
In a multisensory medium, realism is a multisensory experience:
It has to feel real.